Do not use SKS for distributing weechat signing key
dngray opened this issue · 3 comments
dngray commented
Hi,
The weechat signing key is being spammed, the instructions on https://weechat.org/download/ should not use the SKS network, users attempting the instruction to import the key will break their gnupg installation.
Currently the signing key on SKS is 180MB.
Background:
wiktor-k commented
Agreed. Alternatively weechat should put their key on https://keys.openpgp.org (that is immune to spamming) and advise downloading from that keyserver. Or use Web Key Directory and gpg --sender
when creating the signature (just like kernel.org).
Edit:
I'd revise the instructions to use the following:
gpg --locate-key webmaster@weechat.org
gpg --verify weechat-2.5.tar.xz.asc weechat-2.5.tar.xz
- Check if the fingerprint at the end matches master key fingerprint. Importing weechat key and not checking the signing fingerprint at the end of verify does not cover the case when weechat would be signed by another key present in the keyring.
flashcode commented
This is an issue on weechat.org, not WeeChat itself, so I move the issue in the appropriate repository.
flashcode commented
Fixed, thanks for pointing the problem.